Google Cloud Certified – Professional Cloud Security

This three-day class is designed to help IT professionals prepare for the Google Professional Cloud Security Engineer certification exam.

This Track Includes:

Security in Google Cloud – 3 Days

Duration

3 Days

Description

This course uses lectures, demos, and hands-on labs to teach you about a variety of Google Cloud security controls and techniques. You’ll explore the components of Google Cloud and deploy a secure solution on the platform. You’ll also learn how to mitigate attacks at several points in a Google Cloud-based infrastructure, including distributed denial-of-service attacks, phishing attacks, and threats involving content classification and use.

Topics covered

  • Infrastructure
  • Application Development
  • Security

Objectives:

This course teaches participants the following skills:

  • Understanding the Google approach to security Managing administrative identities using Cloud Identity.
  • Implementing least privilege administrative access using Google Resource Manager, Cloud IAM.
  • Implementing IP traffic controls using VPC firewalls and Google Cloud Armor.
  • Implementing Identity-Aware Proxy.
  • Analyzing changes to the configuration or metadata of resources with Cloud audit logs.
  • Securing a Kubernetes environment.
  • Scanning for and redacting sensitive data with the Cloud Data Loss Prevention API.
  • Scanning a Google Cloud deployment with Forseti.
  • Mitigating important types of vulnerabilities, especially in public access to data and VMs.

Course Outline

The course includes presentations, demonstrations, and hands-on labs.

Module 1: Foundations of GCP Security

  • Understand the GCP shared security responsibility model.
  • Understand Google Cloud’s approach to security.
  • Understand the kinds of threats mitigated by Google and by GCP.
  • Define and Understand Access Transparency and Access Approval (beta).

Module 2:Cloud Identity

  • Cloud Identity.
  • Syncing with Microsoft Active Directory using Google Cloud Directory Sync.
  • Using Managed Service for Microsoft Active Directory (beta).
  • Choosing between Google authentication and SAML-based SSO.
  • Best practices, including DNS configuration, super admin accounts.
  • Lab: Defining Users with Cloud Identity Console.

Module 3: Identity, Access, and Key Management

  • GCP Resource Manager: projects, folders, and organizations.
  • GCP IAM roles, including custom roles.
  • GCP IAM policies, including organization policies.
  • GCP IAM Labels.
  • GCP IAM Recommender.
  • GCP IAM Troubleshooter.
  • GCP IAM Audit Logs.
  • Best practices, including separation of duties and least privilege, the use of Google groups in policies, and avoiding the use of primitive roles.
  • Labs: Configuring Cloud IAM, including custom roles and organization policies.

Module 4: Configuring Google Virtual Private Cloud for Isolation and Security

  • Configuring VPC firewalls (both ingress and egress rules).
  • Load balancing and SSL policies.
  • Private Google API access.
  • SSL proxy use.
  • Best practices for VPC networks, including peering and shared VPC use, correct use of subnetworks.
  • Best security practices for VPNs.
  • Security considerations for interconnect and peering options.
  • Available security products from partners.
  • Defining a service perimeter, including perimeter bridges.
  • Setting up private connectivity to Google APIs and services.
  • Lab: Configuring VPC firewalls.

Module 5: Securing Compute Engine:techniques and best practices

  • Compute Engine service accounts, default and customer-defined.
  • IAM roles for VMs.
  • API scopes for VMs.
  • Managing SSH keys for Linux VMs.
  • Managing RDP logins for Windows VMs.
  • Organization policy controls: trusted images, public IP address, disabling serial port.
  • Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys.
  • Finding and remediating public access to VMs.
  • Best practices, including using hardened custom images, custom service accounts (not the default service account), tailored API scopes, and the use of application default credentials instead of user-managed keys.
  • Lab: Configuring, using, and auditing VM service accounts and scopes.
  • Encrypting VM disks with customer-supplied encryption keys.
  • Lab: Encrypting disks with customer-supplied encryption keys.
  • Using Shielded VMs to maintain the integrity of virtual machines.

Module 6: Advanced Logging and Analysis

  • Cloud Storage and IAM permissions.
  • Cloud Storage and ACLs.
  • Auditing cloud data, including finding and remediating publicly accessible data.
  • Signed Cloud Storage URLs.
  • Signed policy documents.
  • Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys.
  • Best practices, including deleting archived versions of objects after key rotation.
  • Lab: Using customer-supplied encryption keys with Cloud Storage.
  • Lab: Using customer-managed encryption keys with Cloud Storage and Cloud KMS.
  • BigQuery authorized views.
  • BigQuery IAM roles.
  • Best practices, including preferring IAM permissions over ACLs.
  • Lab: Creating a BigQuery authorized view.

Module 7: Securing Applications: techniques and best practices

  • Types of application security vulnerabilities.
  • DoS protections in App Engine and Cloud Functions.
  • Cloud Security Scanner.
  • Lab: Using Cloud Security Scanner to find vulnerabilities in an App Engine application.
  • Identity Aware Proxy.
  • Lab: Configuring Identity Aware Proxy to protect a project.

Module 8: Securing Kubernetes: techniques and best practices

  • Authorization.
  • Securing Workloads.
  • Securing Clusters.
  • Logging and Monitoring.

Module 9: Protecting against Distributed Denial of Service Attacks

  • How DDoS attacks work.
  • Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor (including its rules language).
  • Types of complementary partner products.
  • Lab: Configuring GCLB, CDN, traffic blacklisting with Cloud Armor.

Module 10: Protecting against content-related vulnerabilities

  • Threat: Ransomware.
  • Mitigations: Backups, IAM, Data Loss Prevention API.
  • Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content.
  • Threat: Identity and Oauth phishing.
  • Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API.
  • Lab: Redacting Sensitive Data with Data Loss Prevention API.

Module 11: Monitoring, Logging, Auditing, and Scanning

  • Security Command Center.
  • Stackdriver monitoring and logging.
  • Lab: Installing Stackdriver agents.
  • Lab: Configuring and using Stackdriver monitoring and logging.
  • VPC flow logs.
  • Lab: Viewing and using VPC flow logs in Stackdriver.
  • Cloud audit logging.
  • Lab: Configuring and viewing audit logs in Stackdriver.
  • Deploying and Using Forseti.
  • Lab: Inventorying a Deployment with Forseti Inventory (demo).
  • Lab: Scanning a Deployment with Forseti Scanner (demo).

Audience:

This class is intended for the following job roles:

  • [Cloud] information security analysts, architects, and engineers.
  • Information security/cybersecurity specialists.
  • Cloud infrastructure architects.
  • Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles.
  • The course should also be useful to developers of cloud applications.

Prerequisites

To get the most out of this course, participants should have:

  • Prior completion of Google Cloud Fundamentals: Core Infrastructure or equivalent experience.
  • Prior completion of Networking in Google Cloud or equivalent experience.
  • Knowledge of foundational concepts in information security: Fundamental concepts: vulnerability, threat, attack surface confidentiality, integrity, availability, Common threat types and their mitigation strategies, Public-key cryptography, Public and private key pairs, Certificates Cipher types, Key width Certificate authorities, Transport Layer Security/Secure Sockets, Layer encrypted communication Public key infrastructures Security policy.
  • Basic proficiency with command-line tools and Linux operating system environments
  • Systems Operations experience, including deploying and managing applications, either on-premises or in a public cloud environment
  • Reading comprehension of code in Python or JavaScript

Certification

Google Cloud Certified – Professional Cloud Security Engineer

Below is a Course Schedule for this:

2024

JanFebMarAprMayJun
17,18,1921,22,2320,21,2224,25,2629,30,3126,27,28
JulyAugSepOctNovDec
12,13,1416,17,1820,21,2218,19,2015,16,1713,14,15

Course Fee

Course Fee$2250.00
SME (Company Sponsored) – All Singaporean and Permanent Resident EmployeeNA
Singapore Citizens aged 40 years old and aboveNA
Singapore Citizen and Permanent Resident aged 21 years old and aboveNA

    Book Now